Title
Visualization of security events using an efficient correlation technique
Abstract
The timely and reliable data transfer required by many networked applications necessitates the development of comprehensive security solutions to monitor and protect against an increasing number of malicious attacks. However, providing complete cyber space situation awareness is extremely challenging because of the lack of effective translation mechanisms from low-level situation information to high-level human cognition for decision making and action support. We propose an adaptive cyber security monitoring system that integrates a number of component techniques to collect time-series situation information, perform intrusion detection, keep track of event evolution, characterize and identify security events, and present a visual representation in order to provide comprehensive situational view so that corresponding defense actions can be taken in a timely and effective manner. We explore the principles of designing and applying appropriate visualization techniques for situation monitoring by defining graphical representations of security events. This differs from the traditional rule-based pattern matching techniques in that security events in the proposed system are represented as forms of correlation networks using random matrix theory and identified through the computation of network similarity measurement. The events and corresponding event types are visualized using a stemplot to show location and quantity. Extensive simulation results on event identification illustrate the efficacy of the proposed system.
Year
DOI
Venue
2009
10.1109/CICYBS.2009.4925091
CICS
Keywords
Field
DocType
random matrix theory,intrusion detection,security events,cyber security,network similarity measurement,decision making,matrix algebra,time-series situation information,adaptive cyber security monitoring system,correlation technique,event correlation,stemplot,internet,human cognition,correlation networks,event evolution,translation mechanisms,malicious attacks,visual analysis,cyber space situation awareness,information visualization,action support,time series,data transfer,security of data,rule based,correlation,sensors,security,pattern matching,computer security,data mining,visualization
Data mining,Information visualization,Computer science,Visualization,Situation awareness,Event correlation,Security information and event management,Intrusion detection system,Pattern matching,Creative visualization
Conference
ISBN
Citations 
PageRank 
978-1-4244-2769-7
5
0.59
References 
Authors
3
4
Name
Order
Citations
PageRank
Qishi Wu173462.01
Denise Ferebee2163.59
Yunyue Lin3869.04
Dipankar Dasgupta41226121.74